Free Essay

Connected or Disconnected?

In:

Submitted By delaneyycarter
Words 1618
Pages 7
Carter 1 ! Delaney Carter Mr. Kistler English 1100 Composition 1 7 November 2014 Connected or Disconnected? Technology is always changing and over the years has advanced in some major ways. Not all these ways are necessarily good. Some people believe that technology is helping them, and in many ways it is, but it is also hurting them. Sherry Turkle, a professor at MIT, discusses some of the ways she thinks technology is hurting us in a famous TED (Technology, Entertainment and Design) Talk. In this she gives multiple examples of how people are relying or even trusting technology more than other people. It is crazy to think this, but sadly it is so true. In Sherry Turkle’s TED Talk “Connected, but alone?” she uses pathos to persuade the audience that technology is actually disconnecting us instead of bringing us together. Sherry Turkle’s argument is simple. She believes that people think they are getting closer to one another by using technology, but really they have never been more alone. She provides three main pieces of evidence to support this idea. First, we put our attention wherever we want it to be, and she gives the example of people texting or shopping during important meetings or big events. She says that we are hiding from each other in this way. Second, we think we will always be heard if we are constantly texting or posting to social media websites. Finally, we believe we are never alone when we are online. Turkle does not think that we need to turn away from technology or our devices, we just need to rely less on them. This essay is to prove that she focused on using pathos to convince the audience of these ideas and why they are bad.

Carter 2 ! Sherry Turkle opens her TED Talk by mentioning that her college student daughter sent her a good luck text. Then she goes into her reasons for technology making us alone together, hiding from each other, and the goldilocks effect. After this she brings in her own daughter as an example of being alone together. I think she does this because most of her audience is probably parents rather than college students or younger. Using her daughter as an example puts the idea of their own children into their minds. Now whenever she brings up examples they crowd will not only think if they are doing this, but will also think of their children are. This is important because most parents are protective of their children and want the best for them. So if Sherry Turkle gets her point across that we need to rely less on technology to connect to one another, she will not only be reaching to the generation of parents that she is speaking to. She will also be speaking to the generation of those parent’s children. Another example Turkle uses pathos and children to get her audience to go along with what she is saying, is when she mentions an 18 year old boy that she had interviewed for her research. She tells her listeners that the boy only uses text to communicate, then she goes on to quote him “…someday, someday, but certainly not now, I would like to learn how to have a conversation…” Once again making the parents think of their kids. This example also shows the parents what their children think about technology and connections with one another. My parents would be embarrassed if I ever said that I did not know how to have an actual conversation, and I'm sure that is how most of the parents listening felt too. Sherry Turkle was smart for using children as examples because that is one thing that parents will always listen to. Not only does Turkle use children to grab at the audiences emotions, but she also uses examples with people that are closer to the age of the audience listening. She tells the audience

Carter 3 ! about a woman she has witnessed in a nursing home during her research. The elderly woman was suffering from a loss of her child and was looking to a robot seal to comfort her. As odd as this sounds, the woman actually thought the seal was listening to her and understanding what she was going through. Turkle is making the audience feel bad for this women. She is making her listeners think that this poor old woman has no one to talk, so she turns to technology for comfort. It sounds so bizarre, but it makes the audience feel terrible for her. They hope they are never in a situation where the only person they have to talk to for comfort is a robot seal. Turkle’s TED Talk was filmed about two years ago, but she mentions the feature on iPhones called Siri. Having Siri on my phone, I know how human like it actually is. Apple makers made it so you could talk and interact with “her”. Once again it is technology making use believe that it can understand us while it has never really lived and has no idea what we are going through. Turkle also uses an example of a man that is walking into work, but he feels like he does not have coworkers anymore. She tells the audience that the man explains to her, he does not speak to the people he works with because they are too busy with their emails. Then, he realizes that really he is the one that does not want to be interrupted because he is the one that is so caught up in his devices. Turkle using this example, of a man realizing that it is him that has changed for technology, proves to the audience they can do the same thing. She wants them to know that they can do something about it. This example also gives the listeners a situation that probably most of them witness everyday and a chance to change the technology take over. Sherry Turkle giving these examples of older generations makes it easier for the audience to relate to the points she is trying to get make.

Carter 4 ! Turkle’s biggest use of pathos on the audience is the idea of being alone. No one likes to be alone or feel lonely. Her main argument is we believe that technology is our solution for feeling this way. She says that we are afraid of intimacy; We do not want to be alone, but we are scared of friendship. Today, my generation looks at how many instagram or twitter followers a person has to judge how many friends they have. This is terrible to think that people actually judge one another for how many people follow them on social media. I will be honest, I always love seeing the notification saying that someone would like to follow me pop up on my phone. It makes me think that someone actually wants to know about what I am doing with my life. When all that person wants is a follow back so they can have that same feeling of being wanted. I do not consider these people, that probably could care less about what I am doing, to be my “freinds.” This is what technology has us think though. These are not real friendships, but technology says that if you do not have them then you are alone. But is being alone actually a bad thing? I think everyone needs to have some alone time to relax and escape from the craziness of the world. Now a days it is nearly impossible to actually be alone and away from everyone. The only way to do this is to turn off all your devices, but most people might have a heart attack if they did. So they choose to never be alone. Turkle brings up children again to make sure the parents are still paying attention. She states that “if we do not teach our children to be alone the will only know how to be lonely.” Here Turkle is saying that if the parents do not change their bad habits with technology, then it is going to transfer to their children. No parent wants their children to feel lonely, and Turkle uses this so parents will change their ways. Being alone is not a bad thing, but being lonely because of technology is.

Carter 5 ! This essay gives many examples of how Turkle used pathos to get her audience to believe that technology is really disconnecting us from one another. Technology has become such a important part our lives in today’s society. Technology can do tons of good, but it also has it downfalls. For example, technology has allowed multiple medical and scientific breakthroughs to happen in the last couple of years. It also has been able to connect families and friends from across the world. The down sides of technology is that it has started to consume everyone’s life a little too much. People sleep with their phones right next to them, and they can not go an hour without checking it for calls, text, and social media notifications. For teenagers, it has made having a real face to face conversation a challenge instead of something that is suppose to be natural. Technology has made us believe that life can be edited, when really it is suppose to be a be made up of beautiful mistakes.

! !
Author’s Notes -Things I need to improve on 1. Wordiness 2. Some parts felt like them didn't flow very well. 3. I’m not sure if my ideas were abstract enough. -Things that I did well 1. I really liked having the worksheet to help me.

Similar Documents

Free Essay

Connectedness Research Paper

...topological property. This will be followed up with the proofs of several interesting and essential theorems involving connectedness of a topological space and how it enables us to distinguish between different topological spaces. A topological space X is disconnected if X=A B, where A and B are disjoint, nonempty, open subsets of X. (Roseman, 1999) Definition A topological space X is connected if it is not disconnected. Examples 1. A closed interval [a,b] is connected. To show this, suppose that it was disconnected. Then there are two nonempty disjoint open sets and whose union is [a,b]. Let X be the set equal to A or B and which does not contain the point b. Let s= sup X, the supremum of X. Since X does not contain b, s must be within the interval [a,b] and thus must be within either X or [a,b]\X. If s is within X, then by the definition of supremum there is an open set (s-ε, s+ε) within X. If s is not within X, then is within [a,b]\X, which is also open, and there is an open set (s-ε, s+ε) within [a,b]\X. Either case implies that s is not the supremum. 2. The topological space X=(0,1)\{1/2) is disconnected: A=(0,1/2), B=(1/2,1) (MathWorld) Lemma The following are equivalent for a topological space X: 1) X is connected 2) The only subsets of X that are both open and closed are Φ and X, where Φ denotes the empty set 3) Every continuous function f:X→2disc is constant (Adams and Franzosa, 2008). Definition A function f: X → Y between two topological spaces X and Y is called a...

Words: 1423 - Pages: 6

Premium Essay

Module One Case

...Module 1 Case 9/5/2012 The Disconnection of Being Connected Martin Carnoy wrote: “Thanks to a communications and software revolution, we are more ‘connected’ than ever before—by cell phone, email, and video conferencing—yet more disconnected than in the past from social interaction.” In the past, any time you needed information or help doing something, you had to walk or ride into town and speak to whoever specialized in what you wanted to know. Face to face discussion was the only way to tell people things or to find things out. It later developed into calling one another, which no longer needed face to face but still required a decent amount of social skills. Now, social networks, the internet, and texting creates a world that many people can tap into for hours without ever seeing another human being. They can update hundreds of people in the split of a second on Facebook and Twitter using a smartphone, which I’ve seen people as young as 8 years old own. Angela Mollard blogged about this issue and stated, “But, recently I’ve felt disconnected, which is absurd because last year I received 13,506 emails, sent 432 tweets and became Facebook ‘friends’ with someone I kissed in 1989. I’m so connected that I go online the second I wake up. I’m linked in, favourited, retweeted, liked” (Mollard, 2012). As Mollard states, I also believe that all of this technology connection has done nothing but pull us in closer to the virtual people while in all reality, pushing the people in our...

Words: 748 - Pages: 3

Free Essay

Pentagon's New Map

... Your answer should be approximately one typed page. 1. Summarize the author’s thesis and main arguments in your own words. Do NOT just copy and paste from the article. I strongly believe that the author’s thesis is composed of two parts. First, the author divides the world in two distinct groups: the Functioning Core and the Non-Integrating Gap. The Functioning Core is composed of those nation-states that are connected through communication networks, agreements and associations, financial transactions, and security. He states that these nations are successful and stable because they are actively participating in an international environment with common rules and regulations that are convenient to the group and have common interests related to their economics and political goals The other point of view that the author describes is another group known as the Non-Integrating Gap (“Gap”) nations. The author finds that those nations that are not participating in globalization or participating in the international environment and are disconnected from the global community appeared to deal with oppressive political regimes, never-ending poverty and diseases, corruption, and are more susceptive to sponsor terrorism. Another point that the author discusses is the fact that the United States must address the security hazard and small conflicts of those “Gap” nations currently posse to our nation and the members of the Functioning Core Nations. In other word the nations...

Words: 703 - Pages: 3

Premium Essay

Nt1310 Unit 1 Lab Report

...is working before the satellite can fly its mission. If the data handling system fails, the mission could fail. 1.2 Purpose The purpose of this lab was to learn how a data handling system works and verify that it was functioning properly. METHODOLOGY The DC power supply was turned on and set to 10 volts and 0.7 amps. The batteries on the EPS module were disconnected. The DC power supply was connected to the charge...

Words: 1717 - Pages: 7

Premium Essay

Software Implementation of Central Solar Battery Charging Station

...Bangladesh. Solar energy is a form of best renewable energy and by implementing this project as a prototype one; our motto is to extend the voice for “Go Green-Save the Planet-work for existence”. Software implementation is needed to monitor the charging status of the individual batteries in a station. It can also detect whether the battery has been damaged or not at a certain voltage level. Thus, we have deliberated our software to monitor all the probable actions in the software development for Central Solar Battery Charging Station. It indicates the charging status independently for each battery coupled to the prototype central charging station through a charge controller that deliver the requisite quantity of current to the battery and also connected superficially with a Data Acquisition Card to examine the battery state with our software deployed using VISUAL STUDIO 2010 in C# programming language. Consequently, the entire charging process of the central charging station is a solitary means of communication as we are going to provide input quantity directly from PV solar panel or diesel generator (unconventional source). Keywords- Central Solar Battery Charging Station, Data Acquisition Card, VISUAL STUDIO 2010. Introduction Central Solar Battery Charging Station (CSBCS) provides power to trickle charging of batteries from stand-alone solar panels. It was initially conceived worldwide to bring the price per household of electrification within the capacity to foster the...

Words: 2696 - Pages: 11

Premium Essay

A Rhetorical Analysis Of The IRL Fetish By Nathan Jurgenson

...He is simply trying to demonstrate that both groups are in the same position and have no right to act superior over the other - especially those who spend more time offline. More often than not, people who appear to be infatuated with the digital world are criticized by those who seem to be attached to the more “realistic” world. Not often do you hear someone being ridiculed for being outdoors and partaking in interactive activities. This is where Jurgenson’s frustration lies and when he strongly emphasizes that “to obsess over the offline and deny all the ways we routinely remain disconnected is to fetishize this disconnection” (Jurgenson, 129). In his opinion, those who consider themselves to be connected to the offline world rather than the online one cannot consider themselves better than those who are connected online because both groups are doing the same thing - fetishizing over an inanimate object. This statement brings awareness to the fact that tapping someone on the back for not using their phone for an hour is equivalent to rewarding an elder for being able to use an iPhone efficiently. Realistically, these people who claim to be offline are doing so in spite of being online. They want to break away from the group of people who cannot detach themselves from their electronic devices to the point where they begin to obsess over the ‘real’...

Words: 1051 - Pages: 5

Premium Essay

Pc Upgrades

...enough memory. I removed all media from the pc. I turned the pc off. I unplugged the power supply to the pc. I unplugged all attached cables from the pc. I lifted the plastic shield on the back on the pc stand. I used a flat-head screwdriver to remove the screw that secures the cover. I removed the cover. I then pressed outwards on the tabs on the right and left sides of the memory card to release it. I held the card by the edges and removed it from the compartment. I then oriented the new card with the notch on the edge facing forward and to the right. I held the card by its edges and slide it all the way into the slot pushing downward until it snapped into place. I put the cover back on. I replaced the screw. I reconnected the cables. I connected the power cable and plugged into a power source. I turned the pc on. This upgrade will give the pc more memory and increase system performance. I replaced the hard drive with the Toshiba 2TB internal hard drive. The approximate cost would be $80 plus tax. I choose this hard drive because of the cost and the fact that 2TB is...

Words: 936 - Pages: 4

Premium Essay

Checkpoint

...reservations, they need a reservation system to allow customers to reserve rooms online themselves to make the reservation process smoother. They also suggest a database to store their information, this way all of the other departments can access the information at any given time. Accountant: Accountant has to go and collect receipts from every department and then manually enter them into their accounting application, they also suggest a database where all of this information could be stored. If the other departments filled out their own reports and submitted them to the accountant then the accountant could just verify the info is correct and update the reports and balance sheets. Housekeeping: If the housekeeping department could be connected to the reservation department through a single database then they would know who stayed in what rooms and would be able to track which rooms will need to be cleaned and approximately how long it will take them. They could also benefit from a set inventory list this way the housekeeping department does not waste money on unnecessary materials. PART 2: SELECT TWO PROBLEMS FROM EACH CHECKLIST...

Words: 1173 - Pages: 5

Premium Essay

The Pentagon’s New Map: It Explains Why We’re Going to War and Why We’ll Keep Going to War

...by the rules and are committed to globalization (primarily Europe, North America, and Japan) plus countries that are committed to getting there (Brazil, Russia, India, China, and some others). This is a form of shrinking the gap aka promote globalization. The less connected to globalization, the greater the chance is for U.S. military response. However, the Middle East is ripe for change, a stronger “bully” could push it forward. Focusing America’s military might in the Gap will set the conditions for globalization of nations in the region. Our presence in Japan and Western Europe generated extremely successful Core states. The Gap is everyone else: a collection of disconnected, lawless, and dangerous countries such as Colombia, Pakistan, and North Korea, plus most of the Middle East and Africa. American military action since World War II has been confined almost exclusively to the Gap, which means the task of the United States over the next several decades — and in particular the task of the United States military — is to shrink the Gap and eventually convert the entire world to the values of the Core. Only then will America and the rest of the current Core be safe. Regions not connected to globalization present the greatest threat to the United...

Words: 639 - Pages: 3

Free Essay

Motherboard

...Instructions on replacing motherboard If you are replacing the motherboard with the same model, you should not have to reload the chipset or have to re-install the operating system. This is not always the case but normally it is. If you have access to your personal data, you may want to back it up before replacing the motherboard just to be safe. If you are replacing the motherboard with a different model, then the chances are good that you will have to reload windows. You might be able to install just the chipset and be OK but if that doesn't work, then a re-install is needed. Below is instructions on replacing a motherboard. This is general instructions. Due to the numerous variations of computers, I am not able to go into detail but can give general instructions. For more specific instructions, consult the manufacturer of your computer. NOTE: Most if all cables and connections are easy to determine where they go. Most cables will only plug into one location only so there is no confusion where they plug in at. Also most connections are keyed so they will only go in one direction so you can't accidentally reverse them. However there are a few motherboards that uses cables that you may not be able to determine which one goes where. Before removing cables, check to see if there is more than one location that cable can plug into. You can also do the following to make sure you don't plug it in the wrong place. 1. Draw a diagram of the motherboard. 2. On the diagram...

Words: 1064 - Pages: 5

Free Essay

Review on Segmentation by Clustering

...Lecture 12: Mean Shift and Normalized Cuts CAP 5415 Fall 2006 Each Pixel Data Vector Example Once we have vectors… • Group the vectors into clusters • Algorithms that we talked about last time: – K-means – EM (Expectation Maximization) • Today: (From Comanciu and Meer) – Mean-Shift – Normalized Cuts Mean-Shift • Like EM, this algorithm is built on probabilistic intuitions. • To understand EM we had to understand mixture models • To understand mean-shift, we need to understand kernel density estimation (Take Pattern Recognition!) Basics of Kernel Density Estimation • Let’s say you have a bunch of points drawn from some distribution • What’s the distribution that generated these points? Using a Parametric Model • Could fit a parametric model (like a Gaussian) • Why: – Can express distribution with a few number of parameters (like mean and variance) Non-Parametric Methods • We’ll focus on kernel-density estimates • Basic Idea: Use the data to define the distribution • Intuition: – If I were to draw more samples from the same probability distribution, then those points would probably be close to the points that I have already drawn – Build distribution by putting a little mass of probability around each data-point • Why not: – Limited in flexibility Example Formally Kernel • Most Common Kernel: Gaussian or Normal Kernel • Another way to think about it: (From Tappen – Thesis) – Make an image, put 1(or more) wherever you have...

Words: 775 - Pages: 4

Free Essay

Random Access Memory (Ram)

...Random access memory •  Sequential circuits all depend upon the presence of memory. –  A flip-flop can store one bit of information. –  A register can store a single “word,” typically 32-64 bits. •  Random access memory, or RAM, allows us to store even larger amounts of data. Today we’ll see: –  The basic interface to memory. –  How you can implement static RAM chips hierarchically. This is the last piece we need to put together a computer! •  Random Access Memory 1 Introduction to RAM •  Random-access memory, or RAM, provides large quantities of temporary •  storage in a computer system. Remember the basic capabilities of a memory: –  It should be able to store a value. –  You should be able to read the value that was saved. –  You should be able to change the stored value. A RAM is similar, except that it can store many values. –  An address will specify which memory value we’re interested in. –  Each value can be a multiple-bit word (e.g., 32 bits). We’ll refine the memory properties as follows: A RAM should be able to: - Store many words, one per address - Read the word that was saved at a particular address - Change the word that’s saved at a particular address •  •  Random Access Memory 2 Picture of memory •  You can think of computer memory as being one big array of data. –  The address serves as an array index. –  Each address refers to one word of data. You can read or modify the data at any given memory address, just like you can read...

Words: 2020 - Pages: 9

Premium Essay

Lan Topologies

...traffic. The routers with these workstations will be able to receive, analyzed the source and potential target, and where every packet will need to be sent to. Switches in this scenario, are not able to separate the broadcast domain like the router could; switches are only able to separate the collision in the domain. A network with only switches (hubs) must instead designate one computer as the gateway to the Internet, and that device must possess two network adapters for sharing, one for the home LAN and one for the Internet WAN. (Mitchell, 2014).  Case 2-3 Logical/physical topology: A logical topology is the way devices appear connected with the users. In the other side, physical topology is how they are interconnected by wires, and cables. Bus topology This is a network set up where every computer, and network device will be connected by a single cable. Bus topology is the simplest out of all topology networks where with the help of the central cables all devices communicate throughout...

Words: 452 - Pages: 2

Free Essay

The Cathedral

...role in the theme of the story. From the very start, you could tell he was not fond of the blind man. It seemed as at the beginning, he was shallow, disconnected and insecure. By the end of the story he became more accepting of a person other than himself and proved to be a changed man, thus supporting the author’s theme that seeing is different from looking. The very first trait that can be noticed about the narrator was his shallowness. He was harshly judgmental of the blind man in quite a few ways. For one, the narrator compares him to blind people in movies, by saying “In the movies, the blind man moved slowly and never laughed” (Carver 184), and he also threw in that they usually had to be accompanied by dogs. He was totally wrong of course, because movies are different from real, and doesn’t mean every blind person is deprived of the capability to operate and move around. Another way he portrays his shallowness is by questioning the blind man’s dead wife name, Beulah. “Was his wife a negro?” (Carver 185). Knowing Robert’s wife name was Beulah, he was quick to judge that it was a name for a colored woman. His wife showed extreme anger, and this just shows the narrator to be a shallow person. One more instance is that the he also felt that Robert’s wife suffered because he could have never seen her. Disconnected would also be a very good way to describe the narrator. It seemed like he didn’t know how to socialize...

Words: 777 - Pages: 4

Premium Essay

Homework

...to use, you would use a port expander to fix this problem. There are several different types of port available for expander hardware, but to list a few we have USB, Ethernet, Audio, SAS, VGA, Microphone, DVI, and Video ports.( see pictures below). Port expanders are made generic so it’s compatible with most computers if not all, as long as the computer has the ports for which you are trying to expand for. With anything there are always disadvantages, and advantages. Disadvantages to port expanders are that whenever you have it fully connected it takes away performance from all devices since they all share the same bandwidth. Example if you have a 6GBps port expander which can connect up to 8 devices, when all connected creates a traffic jam making the performance slow creating a bottle neck effect. Also most are external, requires a lot of power, for this reason you possibly overload/ruin the power supply, or PC may not start till all is disconnected. Advantages to port expanders are that it allows you to connect several devices , and gain more ports....

Words: 263 - Pages: 2